theprez98 wrote:Until then I know I would do whatever I could to help, I just need a little help in getting started.

From the hallowed halls of the Church of Wifi..

&quot wrote:The new 'genpmk' program will allow you to hash a password list (UNIX format text file) and save it to an output file. This is still a time-consuming process, however the new coWPAtty version supports input from genpmk hash tables and allows for subsiquent lookups on the same SSID to be nearly instantanious.

A demo at Shmoocon showed that computing the keys to test on-site led to ~12 keys/sec being tested. Applying a hash file, precomputed on a much more powerful machine led to the testing of 18,000 keys/sec. 3 orders of magnitude increase!

Since each Pairwise Master Key is seeded with the SSID of the network it's on, it's imposssible to make up one table for all combinations, you'd have to do up such a table for every possible SSID. The space requirements are enormous. However you can now at least pre-hash default lists and common words for your known SSID's

The CoWF in a seperate project has pre-hashed a password list of 170,000 words against the top 1000 SSID's in the Wigle.net database to give people a place to start.

If you hash out a large table, please drop either myself or Joshua a line and a copy so we can see about in

This is not an official download site, but at the moment, it's the only one.

found this through google, sorry to resurrect an old thread.But surely having the ssid be part of the hash would make the hash easier to decrypt, you have part of it un-encrypted if the ap has ssid broadcast enabled?Or maybe you could then hash the ssid find that part in the hash of the packet and then decrypt the rest using a standard rainbow table?